The mobile services are the most important media between many of telecommunication means such as the Internet and Telephone networks, And thatis be cause of its advantage represented by the high availability and independence of physical location and time,Therefore, the need to protect the mobile information appeared against the changing and the misuse especially with the rapid and wide grow of the mobile network and its wide usage through different types of information such as messages, images and videos. The proposed system uses the watermark as tool to protect images on a mobile device by registering them on a proposed watermarking server. This server allows the owner to protect his images by using invisible wat
... Show MoreSteganography is an important class of security which is widely used in computer and network security nowadays. In this research, a new proposed algorithm was introduced with a new concept of dealing with steganography as an algorithmic secret key technique similar to stream cipher cryptographic system. The proposed algorithm is a secret key system suggested to be used in communications for messages transmission steganography
Human eye offers a number of opportunities for biometric recognition. The essential parts of the eye like cornea, iris, veins and retina can determine different characteristics. Systems using eyes’ features are widely deployed for identification in government requirement levels and laws; but also beginning to have more space in portable validation world.
The first image was prepared to be used and monitored using CLAHE which means (Contrast Limited Adaptive Histogram Equalization) to improve the contrast of the image, after that the 3D surfac
... Show MoreIn this paper we present an operational computer vision system for real-time motion detection and recording that can be used in surveillance system. The system captures a video of a scene and identifies the frames that contains motion and record them in such a way that only the frames that is important to us is recorded and a report is made in the form of a movie is made and can be displayed. All parts that are captured by the camera are recorded to compare both movies. This serves as both a proof-of- concept and a verification of other existing algorithms for motion detection. Motion frames are detected using frame differencing. The results of the experiments with the system indicate the ability to minimize some of the problems false detec
... Show MoreHuman skin detection, which usually performed before image processing, is the method of discovering skin-colored pixels and regions that may be of human faces or limbs in videos or photos. Many computer vision approaches have been developed for skin detection. A skin detector usually transforms a given pixel into a suitable color space and then uses a skin classifier to mark the pixel as a skin or a non-skin pixel. A skin classifier explains the decision boundary of the class of a skin color in the color space based on skin-colored pixels. The purpose of this research is to build a skin detection system that will distinguish between skin and non-skin pixels in colored still pictures. This performed by introducing a metric that measu
... Show MoreThe expanding use of multi-processor supercomputers has made a significant impact on the speed and size of many problems. The adaptation of standard Message Passing Interface protocol (MPI) has enabled programmers to write portable and efficient codes across a wide variety of parallel architectures. Sorting is one of the most common operations performed by a computer. Because sorted data are easier to manipulate than randomly ordered data, many algorithms require sorted data. Sorting is of additional importance to parallel computing because of its close relation to the task of routing data among processes, which is an essential part of many parallel algorithms. In this paper, sequential sorting algorithms, the parallel implementation of man
... Show MoreThe present study intends to trace The friendship in puple and the differences in this according to the variables of age and sex .
The study sample includes (200) puple in intermediate, and secondary schools in Baghdad in AL- Karkh .The sample is the age of whom is ranging from (13) to (15) years .
Maghly scale for measuring the development of friendship is adopted in this study after adjusting it to the Iraqi environment . The Scale consists of (40) items .
The face and construct validity of the Scale is checked as well as its reliability which is checked by test- retest
The study reveals the following :
1 – There is positive effect of the interaction between the of middle scale friendship .
2 – There is No differe
Science, technology and many other fields are use clustering algorithm widely for many applications, this paper presents a new hybrid algorithm called KDBSCAN that work on improving k-mean algorithm and solve two of its
problems, the first problem is number of cluster, when it`s must be entered by user, this problem solved by using DBSCAN algorithm for estimating number of cluster, and the second problem is randomly initial centroid problem that has been dealt with by choosing the centroid in steady method and removing randomly choosing for a better results, this work used DUC 2002 dataset to obtain the results of KDBSCAN algorithm, it`s work in many application fields such as electronics libraries,
Renewal is generally considered an urgent requirement of life, and a section of its continuation, because renewal means that life exists and continues, and just as renewal is in life, renewal is in science, and in this research the issue of renewal in the science of interpretation, and showed through research that renewal in This science was an urgent demand throughout the Islamic ages, as the research showed the necessity of renewal in the material of interpretation, its method and methods, and the researcher presented the opinions of schools about renewal in the interpretation of the Noble Qur’an inferred by living models that refer to their owners.